January 15, 2025

The Cloudera Operational Database 1.48 version supports the SELinux enforcement and enhancement to the database user management.

Cloudera Operational Database supports Security-Enhanced Linux (SELinux) enforcement

Cloudera Operational Database supports creating a database with SELinux enforcement using the Cloudera Operational Database CLI. You must have the CDP_SECURITY_ENFORCING_SELINUX entitlement to be able to use the SELinux support. Please contact Cloudera support if you do not have this entitlement.

The SELinux allows you to set access control through policies. You can set the SELinux mode while creating a new operational database. You can define the SELinux mode using the seLinux parameter in the create-database command. The supported SELinux modes are:

  • ENFORCING: Enables SELinux in enforced mode, actively applying security policies.
  • PERMISSIVE (default): Sets SELinux to permissive mode, logging any security violations without enforcing policies.

If you do not define the seLinux parameter, by default, the PERMISSIVE mode is applied.

The following example shows usage of the seLinux parameter.

opdb create-database --environment-name [***ENVIRONMENT_NAME***] --database-name [***DATABASE_NAME***] --security-request '{"seLinux": string}'

opdb create-database --environment-name cod-7218-micro1 --database-name testDB --security-request '{"seLinux": "ENFORCING"}'
opdb create-database --environment-name cod-7218-micro1 --database-name testDB --security-request '{"seLinux": "PERMISSIVE"}'

For more information, see Cloudera CLI documentation and Setting SELinux Mode.

Assign ODAdmin role at the database level

Cloudera Operational Database supports setting a user as an ODAdmin at the database level. In earlier versions of the Cloudera Operational Database, you could set the ODAdmin at the environment level only, however, for better usability and enhanced security, now you can set it at the database level too.